Showing posts with label antivirus. Show all posts
Showing posts with label antivirus. Show all posts

Tuesday, November 26, 2013

Yes! You are HACKED! (PART-3)

Yes! We are back with the PART 3 of the series 'Yes! You are Hacked!'
In case you missed the earlier posts. you reach both PART-1 and PART-2 here.

So after having posted the 4 signs of your system being compromised, here comes the fifth and the sixth!

Sure sign of system compromise No. 5: Your friends receive fake emails from your email account
This is the one scenario where you might be OK. It's fairly common for our email friends to receive malicious emails from us. A decade ago, when email attachment viruses were all the rage, it was very common for malware programs to survey your email address book and send malicious emails to everyone in it.

Sunday, November 17, 2013

Yes! you are HACKED! (PART-2)

Missed PART-1? Read it HERE!
So, here comes PART-2 of 'Yes! You are HACKED!' series. Read on, it may be possible that you may be a victim and you don't know!

Sure sign of system compromise No. 3: Redirected Internet searches
Many hackers make their living by redirecting your browser somewhere other than where you want to go. A hacker gets paid by getting your clicks to appear on someone else's website, often those who don't know that the clicks to their site are from a malicious redirection.

You can often spot this type of malware by typing a few related, very common words (for example, "puppy" or "goldfish") into Internet search engines and checking to see whether the same websites appear in the results -- almost always with no actual relevance to your terms. Unfortunately, many of today's redirected Internet searches are well hidden from the user through use of additional proxies, so the bogus results are never returned to alert the user. In general, if you have bogus toolbar programs, you're also being redirected. Technical users who really want to confirm can sniff their own browser or network traffic. The traffic sent and returned will always be distinctly different on a compromised computer vs. an uncompromised computer.

Saturday, November 09, 2013

Yes! you are HACKED! (PART-1)

Here are 11 sure signs you've been hacked and what to do in the event of compromise. Note that in all cases, the No. 1 recommendation is to completely restore your system to a known good state before proceeding. In the early days, this meant formatting the computer and restoring all programs and data. Today, depending on your operating system, it might simply mean clicking on a Restore button. Either way, a compromised computer can never be fully trusted again. The recovery steps listed in each category below are the recommendations to follow if you don't want to do a full restore -- but again, a full restore is always a better option, risk-wise.

Wednesday, May 15, 2013

Computer attacked?

!!..Signs That Your Home Computer Is Infected By Spyware or Adware..!!

There are a number of indicators you can watch for which will suggest that your computer has been infected by spyware or adware. Please note that some of the symptoms listed below are not unique to just a spyware or an adware infection.

1) PC Performance – Both Spyware and adware consume your PC's resource like computer memory. Abad spyware infection could dramatically slow your computer'sperformance including causing your system's to become increasingly unstable. Spyware also can affect your internet connection speed as it takes up bandwidth to communicate information back to its creator.

2) Pop up Ads – It is highly likely thatyour computer is infected by Adware if you notice more pop upads appearing than usual. In some cases pop ads start appearing on the desktop even if you have not opened a web browser. Alternatively, search results may appear in a pop up or another browser window relative to the website you are visiting or keyword term you have typed intoa search engine.

3) Browser Toolbars – These programs are commonly bundled with free software which the publisher often describes as "advertiser supported." The toolbar then feeds adverts based on the website you visit. They are usually very difficult to uninstall. "180 Search Assistant" and "Huntbar" are example programs.

4) Browser Settings – Your internet favourites or bookmarks and startpage are two main settings whichare targeted by spyware authors. Web sites are inserted into your list of internet favourites in the hope that you will visit them. Browser hijackers change the start page which is visited when the browser loads. Any unexpected change to your start page is a sign of infection.

5) StartUp Programs – Some spyware variants will try to add themselves to your Windows start up program list. If you boot up time becomes noticeably slower then review your program start up list to check for applications you are not familiar with and remove them. This program list can be review using the " MS Config" option from the Windows XP Run command.

6) Software Failure – A spyware infection can cause someof your programs to crash or stopworking. In particular watch if your Internet Explorer browser refuses to work all of a sudden.

7)Hosts File Changes – The Hosts Fileis a Windows file that maps the numerical IP Address to the Host Name very much like the address book on your cell phone "maps" your friend's name to their telephone number. Some spywareprograms can change these setting so that when you type in"www." for example you are re- directed the spyware author's website.

Friday, January 25, 2013

Generations Of Anti-virus Softwares

The key characteristics of the generation of anti-virus software are as follows:

  • 1st Generation   These anti-virus software programs were called as simple scanners. They needed a virus signature to identify a virus. A variation of such programs kept a watch on the length of programs and looked for changes so as to possibly identify a virus attack.

  • 2nd Generation   These antivirus software programs did not rely on simple virus signatures. Rather, they used some rules to look for possible virus attacks. The basic idea was to look for code blocks that were commonly associated with viruses. For example, such programs can look for encryption key used by a virus, decrypt it, and remove the virus and clean the code. Another variation of these anti-virus programs used to store some identification about the file to detect changes in the contents of the file.

  • 3rd Generation    These anti-virus software programs were memory resident. They watched for viruses based on their actions, rather than their structure. Thus, it is not necessary to maintain a large database of virus signatures. Instead, focus on keeping a watch on a small number of suspect actions.

  • 4th Generation These anti-virus software programs package many anti-virus techniques together(example scanning, monitoring, filtering). They also contain access control features, thus defeating the attempts of a virus to infect the files.